{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T15:20:48Z","timestamp":1742916048673,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319420844"},{"type":"electronic","value":"9783319420851"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-42085-1_40","type":"book-chapter","created":{"date-parts":[[2016,7,1]],"date-time":"2016-07-01T02:50:27Z","timestamp":1467341427000},"page":"514-520","source":"Crossref","is-referenced-by-count":0,"title":["Modelling the MSSG in Terms of Cellular Automata"],"prefix":"10.1007","author":[{"given":"Sara D.","family":"Cardell","sequence":"first","affiliation":[]},{"given":"Amparo","family":"F\u00faster-Sabater","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,7,21]]},"reference":[{"issue":"2\u20133","key":"40_CR1","first-page":"195","volume":"11","author":"SD Cardell","year":"2016","unstructured":"Cardell, S.D., F\u00faster-Sabater, A.: Linear models for the self-shrinking generator based on CA. J. Cell. Automata 11(2\u20133), 195\u2013211 (2016)","journal-title":"J. Cell. Automata"},{"key":"40_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1007\/3-540-48329-2_3","volume-title":"Advances in Cryptology - CRYPTO 1993","author":"D Coppersmith","year":"1994","unstructured":"Coppersmith, D., Krawczyk, H., Mansour, Y.: The shrinking generator. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 22\u201339. Springer, Heidelberg (1994)"},{"issue":"2","key":"40_CR3","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1007\/s12095-012-0079-1","volume":"5","author":"S Das","year":"2013","unstructured":"Das, S., RoyChowdhury, D.: Car30: a new scalable stream cipher with rule 30. Crypt. Commun. 5(2), 137\u2013162 (2013)","journal-title":"Crypt. Commun."},{"key":"40_CR4","unstructured":"eSTREAM: the ECRYPT Stream Cipher Project, ECRYPT II, eSTREAM portfolio. http:\/\/www.ecrypt.eu.org\/stream\/"},{"issue":"3","key":"40_CR5","doi-asserted-by":"crossref","first-page":"461","DOI":"10.1016\/j.neunet.2009.12.008","volume":"23","author":"A F\u00faster-Sabater","year":"2010","unstructured":"F\u00faster-Sabater, A., Pazo-Robles, M.E., Caballero-Gil, P.: A simple linearization of the self-shrinking generator by means of cellular automata. Neural Netw. 23(3), 461\u2013464 (2010)","journal-title":"Neural Netw."},{"key":"40_CR6","volume-title":"Shift Register-Sequences","author":"SW Golomb","year":"1982","unstructured":"Golomb, S.W.: Shift Register-Sequences. Aegean Park Press, Laguna Hill (1982)"},{"key":"40_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"427","DOI":"10.1007\/978-3-319-11520-7_44","volume-title":"Cellular Automata","author":"J Jose","year":"2014","unstructured":"Jose, J., Das, S., Chowdhury, D.R.: Inapplicability of fault attacks against trivium on a cellular automata based stream cipher. In: W\u0105s, J., Sirakoulis, G.C., Bandini, S. (eds.) ACRI 2014. LNCS, vol. 8751, pp. 427\u2013436. Springer, Heidelberg (2014)"},{"issue":"1","key":"40_CR8","doi-asserted-by":"crossref","first-page":"993","DOI":"10.1016\/j.compeleceng.2010.02.004","volume":"36","author":"A Kanso","year":"2010","unstructured":"Kanso, A.: Modified self-shrinking generator. Comput. Electr. Eng. 36(1), 993\u20131001 (2010)","journal-title":"Comput. Electr. Eng."},{"issue":"1","key":"40_CR9","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1109\/TIT.1969.1054260","volume":"15","author":"JL Massey","year":"1969","unstructured":"Massey, J.L.: Shift-register synthesis and BCH decoding. IEEE Trans. Inf. Theory 15(1), 122\u2013127 (1969)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"40_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1007\/BFb0053436","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"W Meier","year":"1995","unstructured":"Meier, W., Staffelbach, O.: The self-shrinking generator. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 205\u2013214. Springer, Heidelberg (1995)"},{"key":"40_CR11","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography","author":"AJ Menezes","year":"1996","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)"},{"key":"40_CR12","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-04101-3","volume-title":"Understanding Cryptography","author":"C Paar","year":"2010","unstructured":"Paar, C., Pelzl, J.: Understanding Cryptography. Springer, Heidelberg (2010)"},{"key":"40_CR13","series-title":"Lecture Notes in Computer Science","volume-title":"New Stream Cipher Designs: The eSTREAM Finalists","year":"2008","unstructured":"Robshaw, M., Billet, O. (eds.): New Stream Cipher Designs. LNCS, vol. 4986. Springer, Heidelberg (2008)"},{"issue":"5985","key":"40_CR14","doi-asserted-by":"crossref","first-page":"419","DOI":"10.1038\/311419a0","volume":"311","author":"S Wolfram","year":"1984","unstructured":"Wolfram, S.: Cellular automata as models of complexity. Nature 311(5985), 419\u2013424 (1984)","journal-title":"Nature"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2016"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-42085-1_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T13:35:19Z","timestamp":1498311319000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-42085-1_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319420844","9783319420851"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-42085-1_40","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}